匿名通信鏈路安全性測試方法
[Abstract]:At present, the Internet is developing rapidly, the threat to information security is increasing day by day, privacy protection becomes more and more important. There are many ways to protect privacy, among which anonymous communication is an important means to protect users' privacy on the Internet. It can effectively defend against attackers' interception and traffic analysis attacks. However, anonymous communication system is not absolutely secure, and it is widely used, and there are more and more related researches and attacks. The significance of anonymous communication system is to hide the important information of both parties through the multi-node transmission of data and the encryption of data. In the process, if the attacker can get the whole link of communication, he can get the IP, of both sides of the communication. So the link security of anonymous communication system is very important. This paper investigates the development of anonymous communication system, the current research situation at home and abroad, and the threats to the link security of the anonymous communication system and the defense measures, through the study of the specific communication process of an anonymous communication system. And the encapsulation process of communication data in the whole communication process. Based on packet grouping and data transmission, two antagonistic testing methods for link security are developed. An anonymous communication system is built on the Internet, and a confrontational test is carried out on this basis, that is, whether or not the nodes can be detected before and after the nodes are located on the basis of obtaining some nodes, and the complete link of the test nodes can be obtained. The destructive and accuracy analysis of the test results of the two testing methods, the concrete influence of the two testing methods on the anonymous communication system, and the recognition of each node are given.
【學(xué)位授予單位】:哈爾濱工業(yè)大學(xué)
【學(xué)位級別】:碩士
【學(xué)位授予年份】:2017
【分類號】:TP309
【參考文獻】
相關(guān)期刊論文 前10條
1 莫家慶;胡忠望;林瑜華;;基于可信計算的匿名通信系統(tǒng)方案研究[J];計算機應(yīng)用與軟件;2016年12期
2 周彥偉;楊啟良;楊波;吳振強;;一種安全性增強的Tor匿名通信系統(tǒng)[J];計算機研究與發(fā)展;2014年07期
3 薛益民;米軍利;;可撤銷匿名性的盲代理群簽名方案[J];合肥工業(yè)大學(xué)學(xué)報(自然科學(xué)版);2013年12期
4 陳周國;蒲石;祝世雄;;匿名網(wǎng)絡(luò)追蹤溯源綜述[J];計算機研究與發(fā)展;2012年S2期
5 何興高;車明明;張鳳荔;;入侵防御系統(tǒng)中TCP數(shù)據(jù)流重組的設(shè)計與實現(xiàn)[J];計算機光盤軟件與應(yīng)用;2012年17期
6 蘇雪麗;袁丁;;Windows下兩種API鉤掛技術(shù)的研究與實現(xiàn)[J];計算機工程與設(shè)計;2011年07期
7 褚誠云;;安全編碼實踐之五 地址空間格局隨機化ASLR[J];程序員;2009年05期
8 周超;虞慧群;;Windows命名管道技術(shù)的分析與實現(xiàn)[J];電腦與信息技術(shù);2007年06期
9 劉毅;;應(yīng)用WM_COPYDATA消息實現(xiàn)程序間通訊和控制[J];樂山師范學(xué)院學(xué)報;2007年12期
10 劉克勝;王忠壽;;API Hook關(guān)鍵技術(shù)解析[J];網(wǎng)絡(luò)安全技術(shù)與應(yīng)用;2006年11期
相關(guān)博士學(xué)位論文 前2條
1 梅穎;車聯(lián)網(wǎng)隱私保護研究[D];華中科技大學(xué);2014年
2 王偉平;匿名通信系統(tǒng)性能及可擴展性研究[D];中南大學(xué);2004年
相關(guān)碩士學(xué)位論文 前1條
1 鄭光;Tor匿名通信系統(tǒng)的安全性分析與研究[D];上海交通大學(xué);2011年
,本文編號:2297012
本文鏈接:http://sikaile.net/kejilunwen/ruanjiangongchenglunwen/2297012.html